ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Detection Systems Research

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.

  • Red Cloak Threat Detection & Responses

    Sponsored by: Dell SecureWorks

    Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.

  • The Cybersecurity Effectiveness Podcast: MacKenzie Brown

    Sponsored by: Verodin

    In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.

  • Office 365 Anti-Phishing Tools

    Sponsored by: Cisco Umbrella

    Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.

  • Comprehensive, Integrated Security with the Cynet 360 Platform

    Sponsored by: Cynet

    This IDC Vendor Profile provides an overview of Cynet 360, a platform for the detection of common and advanced threats and automated remediation. Download the vendor profile to learn more about Cynet today.

  • Security Instrumentation for Incident Response Teams

    Sponsored by: Verodin

    Effective incident response conditioning requires an ongoing feedback loop between offense and defense. In this brief, learn about the key security benefits of The Verodin Security Instrumentation Platform (SIP) including bridging the gap between offense and defense and improving incident prevention and detection configurations.

  • A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group

    Sponsored by: Gigamon

    Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.

  • MDR Buyer's Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.

  • Dragos Industrial Cybersecurity Platform

    Sponsored by: Dragos

    The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.

  • SOCs vs. AFCs: What's the Difference?

    Sponsored by: Optiv

    Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.

  • RSA Conference 2019 Security Operations Center Findings Summary

    Sponsored by: RSA Conference

    The RSA Conference SOC analyzed the Moscone Center wireless traffic which is an open network during the week of the conference. The goal of the RSAC SOC is to use technology to educate conference attendees about what happens on a typical wireless network. Download this resource to explore key findings from the educational exhibit.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Faster Response with Crowdstrike and MITRE ATT&CK

    Sponsored by: CrowdStrike

    As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.

  • How To Identify Compromised Devices With Certainty

    Sponsored by: HelpSystems

    It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.

  • Go Beyond Next-Gen IPS

    Sponsored by: Trend Micro, Inc.

    Organizations have relied on next-gen IPS to detect and block threats at wire speed. But with the first next-gen IPS arriving on the scene more than a decade ago, at what point does "next generation" become "current generation"? In this white paper, learn why enterprises can no longer solely rely on a next-gen IPS to protect their networks.

  • Stay Protected with a Layered Network Defense

    Sponsored by: Trend Micro, Inc.

    Learn why standalone next-generation intrusion prevention systems (NGIPS) are still an enterprise requirement.

  • Breach Detection Systems Test Report

    Sponsored by: Trend Micro, Inc.

    NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000. In this Breach Detection System Test Report, explore the Deep Discover Inspector's security effectiveness, network performance and more.

  • Acalvio Deception Intro Video

    Sponsored by: Acalvio

    In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    Sponsored by: Blackberry Cylance

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • Definitive Guide to Deception 2.0

    Sponsored by: Acalvio

    Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.

  • Acalvio Deception and the MITRE ATT&CK Framework

    Sponsored by: Acalvio

    The Cyber Kill Chain has long been used to describe the stages of an attack commonly used to compromise sensitive assets. Unfortunately, too much emphasis has been placed on the initial exploitation stages, and not enough on the later stages. To overcome this problem, MITRE has developed ATT&CK. Read on to learn about the framework today.

  • 3 Minutes Until the Apocalypse

    Sponsored by: Acalvio

    Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.

  • High-Fidelity Breach Detection with Acalvio Autonomous Deception

    Sponsored by: Acalvio

    ESG Lab validated that Acalvio ShadowPlex is quick and easy to implement at scale. ShadowPlex can deploy hundreds of deception points across numerous network segments and automatically scan your network and make configuration recommendations. Download this ESG lab review to learn more about Acalvio ShadowPlex today.

  • Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo

    Sponsored by: enSilo

    The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.

  • Red Cloak Threat Detection & Response

    Sponsored by: Dell SecureWorks

    Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.